Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 4 Apr 2014 17:08:37 -0400
From: Rich Felker <dalias@...ifal.cx>
To: musl@...ts.openwall.com
Subject: Re: printf issues

On Fri, Apr 04, 2014 at 04:22:46PM -0400, Morten Welinder wrote:
> Another printf issue has shown up, this time with memory corruption.
> 
>     printf ("%.3E\n", 999999999.0);
> 
> The rounding test correctly decides that it needs to round this value
> up to 1E+09.  It is, however, utterly unprepared for having nowhere to
> put the carry.  It happily accesses and changes one or more elements
> before the one that held 999999999.

I suspect this may be true; if so, it's a very nice catch. Were you
able to determine what data it clobbers (in practice; obviously this
is compiler-specific) and whether the clobber has any observable
effects?

Rich

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.